dimensions of vulnerability in the information age
TRANSCRIPT
![Page 1: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/1.jpg)
Dimensions of Vulnerabilityin the Information Age
presented by Valorie A. Stokes, Library Media Specialist
Platte County R3 High School
http://bit.ly/20O1fAJ
![Page 2: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/2.jpg)
“To grow up is to accept vulnerability…to be alive is to be vulnerable.” --
Madeleine L’Engle
![Page 3: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/3.jpg)
By the End of This Session...
● External and Internal Vulnerabilities
● Two Mental Models to Reference
● Manifestations of Vulnerability
● Observation, Reflection and Discussion Takeaways
![Page 4: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/4.jpg)
External Vulnerabilities
Cyberterrorism
Malware and Viruses
Identity Theft
Phishing Scams
Key Logging
![Page 5: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/5.jpg)
Photo credit: “O Elephante” by Morilo Morals is licensed under CC BY 2.0
![Page 6: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/6.jpg)
InternalVulnerabilitiesPerceptions & Realities of Time
Perceptions & Narratives of Self
Perceptions & Narratives About Others
Photo Credit: “Kaleidescope” by nathanmac87, Flickr | CC-BY/ via Wylio/gray screened from original
![Page 7: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/7.jpg)
Now you see it...
![Page 8: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/8.jpg)
Now you don’t.
![Page 9: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/9.jpg)
WiseWitty
EruditePithy
Bloggers and
Tweeters
![Page 10: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/10.jpg)
“Teaching is hard enough without worrying if your mask is on straight, or cracking, or peeling.” --Sam Bennett
Photo Credit: “Lucha libre mascaras” by Jonathan McIntosh is licensed under CC BY-SA 3.0
![Page 11: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/11.jpg)
Photo credit: “Frustration” by Peter Alfred Hess is licensed under CC BY 2.0
![Page 12: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/12.jpg)
Pretense Practitioners Bozos on the Bus
Everyone is on this continuum somewhere
Mental Model #1: TECtinuum
Sanguine Citizenry
TECtinuum V 1.0 created by Valorie A. Stokes METC 2/2016
![Page 13: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/13.jpg)
Pretense Practitioners
Either faking or feigning it
Photo Credit: "Day 43 - Every Brilliant Thing: Hope!" 2012 Simon James, Flickr | CC-BY-SA | via Wylio/gray screened from the original
![Page 14: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/14.jpg)
Bozos on the Bus
Fear, foible or frustration-filled;looking longingly at that other
cool “tech kids’” bus
Photo Credit: Clowns on a Bus. © Fang-Su; http://www.fangsu-photos.com/Life/Live/Santa-claus-11-11/ (used with permission)
![Page 15: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/15.jpg)
Sanguine Citizenry
Believe technology makes everything easier and better and take any opportunity to say so
Photo Credit: “Wearable Technology” by Keoni Cabal is licensed under CC BY 2.0
![Page 16: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/16.jpg)
Everyone is on this continuum somewhere
FOMO Sufferers
The OZZIEs RHINO’S Realm
“Impostors”
How Internal Vulnerabilities manifest themselves on this Continuum
Luddites & Technophobes
Tech Freaks & Geeks
![Page 17: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/17.jpg)
FOMO Sufferers
The OZZIEs RHINO’S Realm
“Impostors”
They try to look and/or act the part of a wizard with technology, but sooner or later someone will see behind their curtain.
They possess that Fear Of Missing Out; sense they aren’t quite in on all the “secrets” others know about how to navigate or be adept with technology.
Like Bolt’s animated hamster friend, they are running as fast as they can to keep up but have to contend with the bubble of their existence.
They actually do know pretty well what they are doing yet still feel less than confident about their skills and are nagged by the notion that the jig will soon be up.Manifestations of
Internal Vulnerabilities
Bozos on the Bus
![Page 18: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/18.jpg)
Certain Givens Feed...
the Vulnerability Beasts
![Page 19: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/19.jpg)
Given #1The nature and legacy
of academe
![Page 20: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/20.jpg)
Given #2The GTA, Instagram, Tumblr Red Herring
Photo Credit: “Tiff’s Enjoying her Christmas Present” 2008 by Marco Arment, Flickr | CC-BY | via Wylio/gray-screened from the original
![Page 21: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/21.jpg)
Given #3Reluctance to ask
questions/look stupid
Students. 2011 copyright by Tulane University. All rights reserved.
![Page 22: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/22.jpg)
Given #4The age and self-consciousness combo
Photo Credit: "IT Family", 2011 Ed Ivanushkin, Flickr | CC-BY-SA | via Wylio/gray screened from the original
![Page 23: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/23.jpg)
Given #5Life stage/context
constraints
Photo Credit: "Mother's moment", 2009 by Leonid Mamchenkov, Flickr | CC-BY | via Wylio/gray screened from the original
![Page 24: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/24.jpg)
Given #6The Haves, the Have-Nots and the Having-to-Catch-Ups
Photo Credit: "Knight-Crane Convergence Lab" by Knight Foundation is licensed under CC BY 2.0/flipped horizontally and gray screened from the original
![Page 25: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/25.jpg)
Photo Credit: "Fairy Bench" by Derek Markham is licensed under CC BY 2.0
![Page 26: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/26.jpg)
Some stories people tell themselves about technology...
“I don’t have time to learn this stuff with everything else asked of me.”
“I am just so overwhelmed!”
“I don’t know what tool or resource to use when.”
“I feel like I just get comfortable with “X” and--poof--it goes away.”
“Students don’t need technology to learn ‘X’”?
![Page 27: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/27.jpg)
The ODONO
Cycle
Mental Model #2
by Jim Burke
![Page 28: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/28.jpg)
Orientation includes…
- Innocence
- Interruption
Photo Credit: “Breaking News!” by Mike Licht is licensed under CC BY 2.0
![Page 29: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/29.jpg)
Dis-Orientation includes…
- Suffering
- Intervention
- Knowledge
![Page 30: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/30.jpg)
New Orientation includes…
- Internalization
- Wisdom
Photo Credit: “Wisdom” by Moyan Brenn is licensed under CC BY 2.0
![Page 31: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/31.jpg)
For Observation,Discussion, and Reflection(in one-on-one, small group or large group settings)
![Page 32: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/32.jpg)
● With whom have you interacted that you could place on one of these mental models?
● What makes you put them there? Why would they likely be there?
● How can doing this quick type of “formative assessment” help you to help them?
Pretense Practitioners Bozos on the Bus Sanguine Citizenry
![Page 33: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/33.jpg)
● What stories do you think (or know) some of your colleagues are telling themselves about technology tools they are being asked to adopt or integrate into the work they are doing?
● How could some of those stories be shared with others to alleviate pressures, frustrations or fears?
● Why would any of this information be helpful for you to know?
![Page 34: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/34.jpg)
● When a new tech tool or resource is introduced to you, what is typically your reaction?
● Does it make a difference if you are a) invited to just explore it or b) expected to use it by a certain time or in a certain way?
Pretense Practitioners Bozos on the Bus Sanguine Citizenry
![Page 35: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/35.jpg)
● Share either the continuum (or your own version of it) or the ODONO Cycle; have people place themselves on one of those models in the context of working with a new tech tool or resource. Talk about why they placed themselves where they did.
● How can using models like these or similar ones help us to differentiate PD or help better design tech PD to take that range of reactions into account?
![Page 36: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/36.jpg)
Thanks for your time and attention
and remember...
![Page 37: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/37.jpg)
“Vulnerability is the birthplace of innovation, creativity and change.”
--Brene Brown
![Page 38: Dimensions of Vulnerability in the Information Age](https://reader030.vdocuments.us/reader030/viewer/2022032613/588484a71a28ab6d1a8b4d5b/html5/thumbnails/38.jpg)
Works that Inspired or Informed this Presentation
Brown, Brené. Rising strong. New York: Spiegel & Grau, 2015. Print.
Burke, Jim. "ODONO: Life, Learning, Leading, and Literature." Web log post. English Companion. Jim Burke. Web. 27 Nov. 2015.
L'Engle, Madeleine. Walking on Water: Reflections on Faith and Art. New York: North Point, 1995. Print.
Lesser, Elizabeth. Broken Open: How Difficult times Can Help Us Grow. New York: Villard, 2005. Print.